Secure distributed applications often include code to authenticate users, verify access rights, and establish secure communication channels between software components (e.g., clie...
This paper presents new technology that accelerates system verification. Traditional methods for verifying functional designs are based on logic simulation, which becomes more tim...
Young-Il Kim, Woo-Seung Yang, Young-Su Kwon, Chong...
In this work we propose a method for securing port facilities which uses a set of video cameras to automatically detect various vessel classes moving within buffer zones and off-l...
This paper presents a new, accurate, efficient and unified method for dynamic animation of one, two or three-dimensional deformable objects. The objects are modelled as d-dimensio...
How can a mobile robot measure the area of a closed region that is beyond its immediate sensing range? This problem, which we name as blind area measurement, is inspired from scout...